CVE-2025-61417

8.8 HIGH

📋 TL;DR

A stored Cross-Site Scripting (XSS) vulnerability in TastyIgniter's media manager allows attackers to upload malicious SVG files containing JavaScript. When an administrator previews these files, the code executes in their browser context, potentially enabling account takeover or unauthorized administrative actions. This affects TastyIgniter 3.7.7 installations with admin access to the media manager.

💻 Affected Systems

Products:
  • TastyIgniter
Versions: 3.7.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin access to upload files via /admin/media_manager component. The vulnerability is present in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the TastyIgniter admin panel, allowing attackers to modify admin credentials, inject backdoors, steal sensitive data, or take full control of the application.

🟠

Likely Case

Attackers gain administrative privileges by modifying admin account credentials through XSS payloads, leading to unauthorized access and potential data exfiltration.

🟢

If Mitigated

Limited impact if proper file upload validation and content security policies are implemented, preventing SVG execution or restricting admin preview functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires an attacker to upload a malicious SVG file and trick an admin into previewing it. The GitHub reference includes proof-of-concept details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check TastyIgniter GitHub repository for updates beyond 3.7.7

Vendor Advisory: https://github.com/tastyigniter/TastyIgniter

Restart Required: No

Instructions:

1. Update TastyIgniter to the latest patched version. 2. Apply any security patches from the vendor. 3. Review and sanitize uploaded SVG files in the media manager.

🔧 Temporary Workarounds

Disable SVG uploads

all

Configure the media manager to block SVG file uploads entirely.

Modify TastyIgniter configuration to restrict allowed file types, removing SVG from the list.

Implement Content Security Policy (CSP)

all

Add CSP headers to prevent inline script execution in SVG files.

Add 'Content-Security-Policy: script-src 'self'' to HTTP headers.

🧯 If You Can't Patch

  • Restrict admin access to trusted IP addresses only.
  • Disable the media manager preview functionality for SVG files.

🔍 How to Verify

Check if Vulnerable:

Check if TastyIgniter version is 3.7.7 and test by uploading an SVG with simple JavaScript (e.g., <svg><script>alert('XSS')</script></svg>) and previewing it as admin.

Check Version:

Check TastyIgniter version in admin panel or via application files.

Verify Fix Applied:

After patching, attempt the same SVG upload and preview test; JavaScript should not execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SVG file uploads to /admin/media_manager
  • Admin preview requests for SVG files with suspicious content

Network Indicators:

  • HTTP requests uploading SVG files to the media manager endpoint
  • Outbound connections from admin panel after SVG preview

SIEM Query:

source="web_logs" AND uri="/admin/media_manager" AND file_extension="svg"

🔗 References

📤 Share & Export